A secure* runtime for autonomous AI agents. Policy from plain-English constitutions. (*https://ironcurtain.dev)
☆143Mar 26, 2026Updated this week
Alternatives and similar repositories for ironcurtain
Users that are interested in ironcurtain are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A high-performance matcher designed to solve LOGICAL and TEXT VARIATIONS problems in word matching, implemented in Rust.☆17Updated this week
- Experimental tl;dr summaries for datasets on the Hugging Face Hub!☆10Apr 4, 2024Updated last year
- Align object properties and interface members vertically for JS/TS code☆16Feb 10, 2026Updated last month
- Code Mode MCP — aggregate all your MCP servers behind search() + execute()☆29Feb 26, 2026Updated last month
- Hugging Face Jobs☆19Jul 11, 2025Updated 8 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- An elasticsearch image for kubernetes PetSets☆18Oct 9, 2017Updated 8 years ago
- ☆26Dec 13, 2024Updated last year
- (S)AGE - (Sovereign) Agent Governed Experience☆116Updated this week
- The cActiveDirectorySecurity module contains PowerShell Functions which are designed to report on and manipulate Access Control Lists on …☆11Aug 31, 2018Updated 7 years ago
- Welcome to `ai-secure-code-review`, a repository that integrates static analysis tools with Generative AI, specifically Semgrep and Azure…☆37Nov 9, 2024Updated last year
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 9 months ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Jun 20, 2020Updated 5 years ago
- A repository for possible zgrab2 configurations☆28Dec 3, 2022Updated 3 years ago
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆43Feb 20, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Automated Real-Time Threat Hunting with ATD, Active Response and Elasticsearch/Kibana☆10Aug 17, 2018Updated 7 years ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- Typescript wrapper for the Hugging Face Inference API.☆28Mar 2, 2023Updated 3 years ago
- Prevent accidental PII leakage in LLM prompts before they hit the model.☆43Mar 23, 2026Updated last week
- wallhack for cs:go game☆11Jul 7, 2024Updated last year
- Create a Word document showing your Sentinel configuration☆14Nov 7, 2023Updated 2 years ago
- Sharing my BITS☆13Feb 23, 2018Updated 8 years ago
- TheHiveIRPlaybook is a collection of TheHive case templates used for Incident Response☆13Jul 13, 2020Updated 5 years ago
- Supports Daikin Air Conditioners that use SKYFi via HomeBridge☆10Feb 22, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- YubiKey Smart Card Minidriver Administrative Template (ADMX)☆17Jun 23, 2024Updated last year
- The utility aims to clean up output generated by popular tools by calculating a hash based on specific JSON values to removing junk data.☆16Apr 5, 2024Updated last year
- osquery query packs☆14Aug 31, 2018Updated 7 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Kibana Plugin to Associate custom CSS to Dashboards☆11May 11, 2021Updated 4 years ago
- This project contains the original white paper for Language Construct Modeling (LCM) v1.13, authored by Vincent Shing Hin Chong. It intro…☆15Jul 23, 2025Updated 8 months ago
- go-ima is a tool that checks if a file has been tampered with. It is useful in ensuring integrity in CI systems☆14Sep 28, 2023Updated 2 years ago
- Static analysis for llvm☆20Mar 31, 2015Updated 10 years ago
- A repository for managing the complete lifecycle of large language model (LLM) development. This toolkit integrates open-source framework…☆12Jan 8, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Jan 11, 2020Updated 6 years ago
- ☆15Feb 20, 2026Updated last month
- This PowerShell module allows you to create Microsoft Word documents without Word being installed on the machine☆13Oct 7, 2022Updated 3 years ago
- LLM-Powered Code Security Scanning☆21Apr 2, 2025Updated 11 months ago
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Feb 11, 2012Updated 14 years ago
- Fully-featured spear-phishing toolkit - sample docker setup (Linux-compatible)☆13Jan 12, 2025Updated last year
- Private set of tools for game hacking☆12Jan 25, 2015Updated 11 years ago